Security News > 2025 > January > Juniper enterprise routers backdoored via “magic packet” malware
A stealthy attack campaign turned Juniper enterprise-grade routers into entry points to corporate networks via the “J-magic” backdoor, which is loaded into the devices’ memory and spawns a reverse shell when instructed to do so. “Our telemetry indicates the J-magic campaign was active from mid-2023 until at least mid-2024; in that time, we observed targets in the semiconductor, energy, manufacturing, and IT verticals among others,” Lumen’s Black Lotus Labs team researchers shared. The J-magic malware … More → The post Juniper enterprise routers backdoored via “magic packet” malware appeared first on Help Net Security.
News URL
https://www.helpnetsecurity.com/2025/01/23/juniper-enterprise-routers-backdoor-malware-j-magic/
Related news
- Juniper warns of Mirai botnet targeting Session Smart routers (source)
- Juniper warns of Mirai botnet scanning for Session Smart routers (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers (source)
- Stealthy 'Magic Packet' malware targets Juniper VPN gateways (source)
- Someone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet (source)